General

  • Target

    bd3f5de188a7e68c8cea0d3aec6339219536359717697ff1b1e965728acebe35

  • Size

    1.3MB

  • Sample

    241221-tkn1zasmc1

  • MD5

    de16d320bfca773b71705eaf20fa8564

  • SHA1

    88164db96bb91a4277de46cc4c0f94cd84f4107f

  • SHA256

    bd3f5de188a7e68c8cea0d3aec6339219536359717697ff1b1e965728acebe35

  • SHA512

    514486644ef14ca6cad57c043cc556595f87f3e23d2c355b59f7adb8501f4d494694d7ccf9e9ab8c96c5d7ebe623d01efb248930fc7d95121f6d34f98fda45e6

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      bd3f5de188a7e68c8cea0d3aec6339219536359717697ff1b1e965728acebe35

    • Size

      1.3MB

    • MD5

      de16d320bfca773b71705eaf20fa8564

    • SHA1

      88164db96bb91a4277de46cc4c0f94cd84f4107f

    • SHA256

      bd3f5de188a7e68c8cea0d3aec6339219536359717697ff1b1e965728acebe35

    • SHA512

      514486644ef14ca6cad57c043cc556595f87f3e23d2c355b59f7adb8501f4d494694d7ccf9e9ab8c96c5d7ebe623d01efb248930fc7d95121f6d34f98fda45e6

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks